ID
int64
1
170k
CVE-ID
stringlengths
13
16
CVSS-V3
float64
1.8
10
CVSS-V2
float64
0
10
SEVERITY
stringclasses
4 values
DESCRIPTION
stringlengths
20
3.84k
CWE-ID
stringlengths
5
14
162,701
CVE-2021-31180
7.8
6.8
HIGH
Microsoft Office Graphics Remote Code Execution Vulnerability
NVD-CWE-noinfo
162,702
CVE-2021-31181
8.8
6.5
HIGH
Microsoft SharePoint Remote Code Execution Vulnerability
NVD-CWE-noinfo
162,703
CVE-2021-31182
7.1
4.8
HIGH
Microsoft Bluetooth Driver Spoofing Vulnerability
NVD-CWE-noinfo
162,704
CVE-2021-31183
7.5
5
HIGH
Windows TCP/IP Driver Denial of Service Vulnerability This CVE ID is unique from CVE-2021-33772, CVE-2021-34490.
NVD-CWE-noinfo
162,705
CVE-2021-31184
5.5
2.1
MEDIUM
Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability
CWE-200
162,706
CVE-2021-31185
5.5
2.1
MEDIUM
Windows Desktop Bridge Denial of Service Vulnerability
NVD-CWE-noinfo
162,707
CVE-2021-31186
6.5
4.3
MEDIUM
Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
CWE-200
162,708
CVE-2021-31187
7.8
7.2
HIGH
Windows WalletService Elevation of Privilege Vulnerability
CWE-269
162,709
CVE-2021-31188
5.5
2.1
MEDIUM
Windows Graphics Component Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31170.
CWE-269
162,710
CVE-2021-3119
7.5
5
HIGH
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes a segmentation fault.
CWE-89
162,711
CVE-2021-31190
7.8
4.6
HIGH
Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability
CWE-269
162,712
CVE-2021-31191
5.5
2.1
MEDIUM
Windows Projected File System FS Filter Driver Information Disclosure Vulnerability
CWE-200
162,713
CVE-2021-31192
7.8
6.8
HIGH
Windows Media Foundation Core Remote Code Execution Vulnerability
NVD-CWE-noinfo
162,714
CVE-2021-31193
7.8
4.6
HIGH
Windows SSDP Service Elevation of Privilege Vulnerability
CWE-269
162,715
CVE-2021-31194
8.8
6.5
HIGH
OLE Automation Remote Code Execution Vulnerability
NVD-CWE-noinfo
162,716
CVE-2021-31195
8.8
6.8
HIGH
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31198.
NVD-CWE-noinfo
162,717
CVE-2021-31196
7.2
6.5
HIGH
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31206, CVE-2021-34473.
NVD-CWE-noinfo
162,718
CVE-2021-31198
7.8
6.8
HIGH
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31195.
CWE-77
162,719
CVE-2021-31199
7.8
4.6
HIGH
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31201.
CWE-269
162,720
CVE-2021-3120
9.8
10
CRITICAL
An arbitrary file upload vulnerability in the YITH WooCommerce Gift Cards Premium plugin before 3.3.1 for WordPress allows remote attackers to achieve remote code execution on the operating system in the security context of the web server. In order to exploit this vulnerability, an attacker must be able to place a valid Gift Card product into the shopping cart. An uploaded file is placed at a predetermined path on the web server with a user-specified filename and extension. This occurs because the ywgc-upload-picture parameter can have a .php value even though the intention was to only allow uploads of Gift Card images.
CWE-434
162,721
CVE-2021-31200
7.2
6.5
HIGH
Common Utilities Remote Code Execution Vulnerability
NVD-CWE-noinfo
162,722
CVE-2021-31201
7.8
4.6
HIGH
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31199.
CWE-269
162,723
CVE-2021-31204
7.8
4.6
HIGH
.NET and Visual Studio Elevation of Privilege Vulnerability
CWE-269
162,724
CVE-2021-31205
6.5
4.3
MEDIUM
Windows SMB Client Security Feature Bypass Vulnerability
NVD-CWE-noinfo
162,725
CVE-2021-31206
8
7.9
HIGH
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-34473.
NVD-CWE-noinfo
162,726
CVE-2021-31207
7.2
6.5
HIGH
Microsoft Exchange Server Security Feature Bypass Vulnerability
NVD-CWE-noinfo
162,727
CVE-2021-31208
7.8
4.6
HIGH
Windows Container Manager Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31165, CVE-2021-31167, CVE-2021-31168, CVE-2021-31169.
CWE-269
162,728
CVE-2021-31209
8.1
5.8
HIGH
Microsoft Exchange Server Spoofing Vulnerability
NVD-CWE-noinfo
162,729
CVE-2021-3121
8.6
7.5
HIGH
An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue.
CWE-129
162,730
CVE-2021-31211
7.8
6.8
HIGH
Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31214.
NVD-CWE-noinfo
162,731
CVE-2021-31213
7.8
6.8
HIGH
Visual Studio Code Remote Containers Extension Remote Code Execution Vulnerability
NVD-CWE-noinfo
162,732
CVE-2021-31214
7.8
9.3
HIGH
Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31211.
CWE-77
162,733
CVE-2021-31215
8.8
6.5
HIGH
SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11.7 allows remote code execution as SlurmUser because use of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling.
NVD-CWE-noinfo
162,734
CVE-2021-31216
8.1
5.5
HIGH
Siren Investigate before 11.1.1 contains a server side request forgery (SSRF) defect in the built-in image proxy route (which is enabled by default). An attacker with access to the Investigate installation can specify an arbitrary URL in the parameters of the image proxy route and fetch external URLs as the Investigate process on the host.
CWE-918
162,735
CVE-2021-31217
9.1
9.4
CRITICAL
In SolarWinds DameWare Mini Remote Control Server 12.0.1.200, insecure file permissions allow file deletion as SYSTEM.
CWE-276
162,736
CVE-2021-3122
9.8
10
CRITICAL
CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."
CWE-78
162,737
CVE-2021-31220
5.2
2.3
MEDIUM
SES Evolution before 2.1.0 allows modifying security policies by leveraging access of a user having read-only access to security policies.
NVD-CWE-noinfo
162,738
CVE-2021-31221
5.7
2.9
MEDIUM
SES Evolution before 2.1.0 allows deleting some parts of a security policy by leveraging access to a computer having the administration console installed.
NVD-CWE-noinfo
162,739
CVE-2021-31222
5.7
2.9
MEDIUM
SES Evolution before 2.1.0 allows updating some parts of a security policy by leveraging access to a computer having the administration console installed.
NVD-CWE-noinfo
162,740
CVE-2021-31223
5.7
2.9
MEDIUM
SES Evolution before 2.1.0 allows reading some parts of a security policy by leveraging access to a computer having the administration console installed.
NVD-CWE-noinfo
162,741
CVE-2021-31224
3.5
2.9
LOW
SES Evolution before 2.1.0 allows duplicating an existing security policy by leveraging access of a user having read-only access to security policies.
NVD-CWE-noinfo
162,742
CVE-2021-31225
7.3
4.3
HIGH
SES Evolution before 2.1.0 allows deleting some resources not currently in use by any security policy by leveraging access to a computer having the administration console installed.
NVD-CWE-noinfo
162,743
CVE-2021-31226
9.8
7.5
CRITICAL
An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to lack of size validation. This vulnerability requires the attacker to send a crafted HTTP POST request with a URI longer than 50 bytes. This leads to a heap overflow in wbs_post() via an strcpy() call.
CWE-787
162,744
CVE-2021-31227
7.5
5
HIGH
An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to an incorrect signed integer comparison. This vulnerability requires the attacker to send a malformed HTTP packet with a negative Content-Length, which bypasses the size checks and results in a large heap overflow in the wbs_multidata buffer copy.
CWE-787
162,745
CVE-2021-31228
7.5
5
HIGH
An issue was discovered in HCC embedded InterNiche 4.0.1. This vulnerability allows the attacker to predict a DNS query's source port in order to send forged DNS response packets that will be accepted as valid answers to the DNS client's requests (without sniffing the specific request). Data is predictable because it is based on the time of day, and has too few bits.
CWE-345
162,746
CVE-2021-31229
6.5
4.3
MEDIUM
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd() performs incorrect memory handling while parsing crafted XML files, which leads to an out-of-bounds write of a one byte constant.
CWE-787
162,747
CVE-2021-31231
5.5
2.1
MEDIUM
The Alertmanager in Grafana Enterprise Metrics before 1.2.1 and Metrics Enterprise 1.2.1 has a local file disclosure vulnerability when experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list.
CWE-20
162,748
CVE-2021-31232
5.5
2.1
MEDIUM
The Alertmanager in CNCF Cortex before 1.8.1 has a local file disclosure vulnerability when -experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list.
CWE-20
162,749
CVE-2021-3124
5.4
3.5
MEDIUM
Stored cross-site scripting (XSS) in form field in robust.systems product Custom Global Variables v 1.0.5 allows a remote attacker to inject arbitrary code via the vars[0][name] field.
CWE-79
162,750
CVE-2021-31245
5.9
4.3
MEDIUM
omr-admin.py in openmptcprouter-vps-admin 0.57.3 and earlier compares the user provided password with the original password in a length dependent manner, which allows remote attackers to guess the password via a timing attack.
CWE-287
162,751
CVE-2021-31249
6.5
6.4
MEDIUM
A CRLF injection vulnerability was found on BF-430, BF-431, and BF-450M TCP/IP Converter devices from CHIYU Technology Inc due to a lack of validation on the parameter redirect= available on multiple CGI components.
NVD-CWE-Other
162,752
CVE-2021-3125
7.5
4.3
HIGH
In TP-Link TL-XDR3230 < 1.0.12, TL-XDR1850 < 1.0.9, TL-XDR1860 < 1.0.14, TL-XDR3250 < 1.0.2, TL-XDR6060 Turbo < 1.1.8, TL-XDR5430 < 1.0.11, and possibly others, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.
CWE-834
162,753
CVE-2021-31250
5.4
3.5
MEDIUM
Multiple storage XSS vulnerabilities were discovered on BF-430, BF-431 and BF-450M TCP/IP Converter devices from CHIYU Technology Inc due to a lack of sanitization of the input on the components man.cgi, if.cgi, dhcpc.cgi, ppp.cgi.
CWE-79
162,754
CVE-2021-31251
9.8
7.5
CRITICAL
An authentication bypass in telnet server in BF-430 and BF431 232/422 TCP/IP Converter, BF-450M and SEMAC from CHIYU Technology Inc allows obtaining a privileged connection with the target device by supplying a specially malformed request and an attacker may force the remote telnet server to believe that the user has already authenticated.
CWE-287
162,755
CVE-2021-31252
6.1
5.8
MEDIUM
An open redirect vulnerability exists in BF-630, BF-450M, BF-430, BF-431, BF631-W, BF830-W, Webpass, and SEMAC devices from CHIYU Technology that can be exploited by sending a link that has a specially crafted URL to convince the user to click on it.
CWE-601
162,756
CVE-2021-31254
7.8
6.8
HIGH
Buffer overflow in the tenc_box_read function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file, related invalid IV sizes.
CWE-787
162,757
CVE-2021-31255
7.8
6.8
HIGH
Buffer overflow in the abst_box_read function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.
CWE-120
162,758
CVE-2021-31256
5.5
4.3
MEDIUM
Memory leak in the stbl_GetSampleInfos function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
CWE-119
162,759
CVE-2021-31257
5.5
4.3
MEDIUM
The HintFile function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
CWE-476
162,760
CVE-2021-31258
5.5
4.3
MEDIUM
The gf_isom_set_extraction_slc function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
CWE-476
162,761
CVE-2021-31259
5.5
4.3
MEDIUM
The gf_isom_cenc_get_default_info_internal function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
CWE-476
162,762
CVE-2021-31260
5.5
4.3
MEDIUM
The MergeTrack function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
CWE-476
162,763
CVE-2021-31261
5.5
4.3
MEDIUM
The gf_hinter_track_new function in GPAC 1.0.1 allows attackers to read memory via a crafted file in the MP4Box command.
CWE-119
162,764
CVE-2021-31262
5.5
4.3
MEDIUM
The AV1_DuplicateConfig function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
CWE-476
162,765
CVE-2021-3127
7.5
5
HIGH
NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled.
CWE-863
162,766
CVE-2021-31272
9.8
7.5
CRITICAL
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
CWE-22
162,767
CVE-2021-31274
5.4
3.5
MEDIUM
In LibreNMS < 21.3.0, a stored XSS vulnerability was identified in the API Access page due to insufficient sanitization of the $api->description variable. As a result, arbitrary Javascript code can get executed.
CWE-79
162,768
CVE-2021-3128
7.5
5
HIGH
In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.
CWE-834
162,769
CVE-2021-3129
9.8
7.5
CRITICAL
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
NVD-CWE-noinfo
162,770
CVE-2021-31292
7.5
5
HIGH
An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based buffer overflow and cause a denial of service (DOS) via crafted metadata.
CWE-190
162,771
CVE-2021-3130
5.9
4.3
MEDIUM
Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible.
CWE-522
162,772
CVE-2021-3131
7.5
5
HIGH
The Web server in 1C:Enterprise 8 before 8.3.17.1851 sends base64 encoded credentials in the creds URL parameter.
CWE-522
162,773
CVE-2021-31315
5.5
4.3
MEDIUM
Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Stack Based Overflow in the blit function of their custom fork of the rlottie library. A remote attacker might be able to access Telegram's stack memory out-of-bounds on a victim device via a malicious animated sticker.
CWE-787
162,774
CVE-2021-31316
9.8
10
CRITICAL
The unprivileged user portal part of CentOS Web Panel is affected by a SQL Injection via the 'idsession' HTTP POST parameter.
CWE-89
162,775
CVE-2021-31317
5.5
4.3
MEDIUM
Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Type Confusion in the VDasher constructor of their custom fork of the rlottie library. A remote attacker might be able to access Telegram's heap memory out-of-bounds on a victim device via a malicious animated sticker.
CWE-843
162,776
CVE-2021-31318
5.5
4.3
MEDIUM
Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Type Confusion in the LOTCompLayerItem::LOTCompLayerItem function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker.
CWE-843
162,777
CVE-2021-31319
5.5
4.3
MEDIUM
Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by an Integer Overflow in the LOTGradient::populate function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker.
CWE-190
162,778
CVE-2021-31320
7.1
5.8
HIGH
Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the VGradientCache::generateGradientColorTable function of their custom fork of the rlottie library. A remote attacker might be able to overwrite heap memory out-of-bounds on a victim device via a malicious animated sticker.
CWE-787
162,779
CVE-2021-31321
7.1
5.8
HIGH
Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Stack Based Overflow in the gray_split_cubic function of their custom fork of the rlottie library. A remote attacker might be able to overwrite Telegram's stack memory out-of-bounds on a victim device via a malicious animated sticker.
CWE-787
162,780
CVE-2021-31322
5.5
4.3
MEDIUM
Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the LOTGradient::populate function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker.
CWE-787
162,781
CVE-2021-31323
5.5
4.3
MEDIUM
Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the LottieParserImpl::parseDashProperty function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker.
CWE-787
162,782
CVE-2021-31324
9.8
10
CRITICAL
The unprivileged user portal part of CentOS Web Panel is affected by a Command Injection vulnerability leading to root Remote Code Execution.
CWE-77
162,783
CVE-2021-31327
5.4
3.5
MEDIUM
Stored XSS in Remote Clinic v2.0 in /medicines due to Medicine Name Field.
CWE-79
162,784
CVE-2021-31329
5.4
3.5
MEDIUM
Cross Site Scripting (XSS) in Remote Clinic v2.0 via the "Chat" and "Personal Address" field on staff/register.php
CWE-79
162,785
CVE-2021-3133
8.8
6.8
HIGH
The Elementor Contact Form DB plugin before 1.6 for WordPress allows CSRF via backend admin pages.
CWE-352
162,786
CVE-2021-31337
9.8
6.8
CRITICAL
The Telnet service of the SIMATIC HMI Comfort Panels system component in affected products does not require authentication, which may allow a remote attacker to gain access to the device if the service is enabled. Telnet is disabled by default on the SINAMICS Medium Voltage Products (SINAMICS SL150: All versions, SINAMICS SM150: All versions, SINAMICS SM150i: All versions).
CWE-306
162,787
CVE-2021-31338
7.8
4.6
HIGH
A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.0 SP1). Affected devices allow to modify configuration settings over an unauthenticated channel. This could allow a local attacker to escalate privileges and execute own code on the device.
NVD-CWE-Other
162,788
CVE-2021-31339
4.3
4
MEDIUM
A vulnerability has been identified in Mendix Excel Importer Module (All versions < V9.0.3). Uploading a manipulated XML File results in an exception that could expose information about the Application-Server and the used XML-Framework.
CWE-209
162,789
CVE-2021-3134
7.8
4.6
HIGH
Mubu 2.2.1 allows local users to gain privileges to execute commands, aka CNVD-2020-68878.
CWE-269
162,790
CVE-2021-31340
7.5
5
HIGH
A vulnerability has been identified in SIMATIC RF166C (All versions > V1.1 and < V1.3.2), SIMATIC RF185C (All versions > V1.1 and < V1.3.2), SIMATIC RF186C (All versions > V1.1 and < V1.3.2), SIMATIC RF186CI (All versions > V1.1 and < V1.3.2), SIMATIC RF188C (All versions > V1.1 and < V1.3.2), SIMATIC RF188CI (All versions > V1.1 and < V1.3.2), SIMATIC RF360R (All versions), SIMATIC RF615R (All versions > V3.0), SIMATIC RF680R (All versions > V3.0), SIMATIC RF685R (All versions > V3.0). Affected devices do not properly handle large numbers of incoming connections. An attacker may leverage this to cause a Denial-of-Service situation.
CWE-400
162,791
CVE-2021-31341
4.3
4
MEDIUM
Uploading a table mapping using a manipulated XML file results in an exception that could expose information about the application-server and the used XML-framework on the Mendix Database Replication Module (All versions prior to v7.0.1).
CWE-209
162,792
CVE-2021-31342
8.8
6.8
HIGH
The ugeom2d.dll library in all versions of Solid Edge SE2020 before 2020MP14 and all versions of Solid Edge SE2021 before SE2021MP5 lack proper validation of user-supplied data when parsing DFT files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process.
CWE-787
162,793
CVE-2021-31343
8.8
6.8
HIGH
The jutil.dll library in all versions of Solid Edge SE2020 before 2020MP14 and all versions of Solid Edge SE2021 before SE2021MP5 lack proper validation of user-supplied data when parsing DFT files. This could result in an out-of-bounds write past the end of an allocation structure. An attacker could leverage this vulnerability to execute code in the context of the current process.
CWE-787
162,794
CVE-2021-31344
5.3
5
MEDIUM
A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. (FSMD-2021-0004)
CWE-843
162,795
CVE-2021-31345
9.1
6.4
CRITICAL
A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on a user-defined applications that runs on top of the UDP protocol. (FSMD-2021-0006)
CWE-1284
162,796
CVE-2021-31346
9.1
6.4
CRITICAL
A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0007)
CWE-1284
162,797
CVE-2021-31347
6.5
4.3
MEDIUM
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_parse_str() performs incorrect memory handling while parsing crafted XML files (writing outside a memory region created by mmap).
CWE-91
162,798
CVE-2021-31348
6.5
4.3
MEDIUM
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_parse_str() performs incorrect memory handling while parsing crafted XML files (out-of-bounds read after a certain strcspn failure).
CWE-91
162,799
CVE-2021-31349
9.8
7.5
CRITICAL
The usage of an internal HTTP header created an authentication bypass vulnerability (CWE-287), allowing an attacker to view internal files, change settings, manipulate services and execute arbitrary code. This issue affects all Juniper Networks 128 Technology Session Smart Router versions prior to 4.5.11, and all versions of 5.0 up to and including 5.0.1.
CWE-287
162,800
CVE-2021-3135
6.1
4.3
MEDIUM
An issue was discovered in the tagDiv Newspaper theme 10.3.9.1 for WordPress. It allows XSS via the wp-admin/admin-ajax.php td_block_id parameter in a td_ajax_block API call.
CWE-79